1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mihalych1998 [28]
3 years ago
10

A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points

)
Arguing with whatever the troll says
Explaining why trolling is rude
Trolling the troll
Log off the web page
Computers and Technology
2 answers:
zvonat [6]3 years ago
5 0

Answer:

log off the web page would be the best answer here or explaining why trolling is rude but log off the web page is the best one here

Blababa [14]3 years ago
4 0

Answer:

Explaining why trolling is rude.

Explanation:

You might be interested in
Describe ways in which an interpersonal learner prefers to learn. Write a paragraph of two to three sentences that explains your
Artyom0805 [142]
An interpersonal learner prefers to learn through interactions with other people. They learn through use of interpersonal skills and communication. They like to be coached and to coach others. So mentoring and apprenticeship is a good way. Moreover, group activities, like group study and role-play are excellent ways fro interpersonal learners to learn.
5 0
3 years ago
We need ____ pointers to build a linked list.
adelina 88 [10]

Answer:

two

Explanation:

A linked list is a data structure which stores the multiple-element with data type

and a pointer that stores the address of the next element.

A linked list is a series of nodes connecting each other by a pointer.

a node contains data and a pointer.

For build an array, two pointers are used:

the first pointer for specifies the starting node called head node.

and the second pointer is used to connect the other node to build the linked list.

Both are used to build the array if we lose the head node we cannot apply the operation because we do not know the starting node and we cannot traverse the whole linked list.

for example:

1->2->3->4->5

here, 1 is the head node and -> denote the link which makes by the second pointer.

3 0
3 years ago
Lucy wants to attach a goal cost to each of her life goals. Why might she do this?
miss Akunina [59]
She wants to identify the amount of money, time, and effort required to realize her goals.
3 0
3 years ago
Read 2 more answers
A Vigenère cipher uses a sequence of "shift-by-n" simple substitutions, where the shifts are indexed using a keyword, with "A" r
Damm [24]

Answer:

ye bro

Explanation:

4 0
2 years ago
True or False. An assembler is a program that accepts a symbolic language program and produces the binary machine language equiv
ruslelena [56]

Answer:

True

Explanation:

An assembler is used for assembly language programming. Assembly language is a low level. Think of an assembler as a compiller in high level languages, Just that in an assembler, there exist a  strong relationship between the code and in the language and the architecture of the machine code instructions set

6 0
3 years ago
Other questions:
  • In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
    13·1 answer
  • What is a gutter margin?
    5·2 answers
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·2 answers
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Linda is the education manager for a national coding service company. Once a month she holds a videoconference with all her codi
    14·1 answer
  • Which two standards below represent newer versions of stp??
    13·1 answer
  • Describe the objectives of e-commerce ?​
    5·1 answer
  • IF YOU GET 5/5 RIGHT YOU WILL GET BRAINLIEST AND 50 [POINTS
    15·2 answers
  • ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect
    13·1 answer
  • Where ....................... the books that you borrowed? *
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!